Hi,

 > I looked with little success
> for some guidance on building a custom switch configuration file for 
> Vyatta.  Any suggestions?

We never had the opportunity to spend some time with their products and 
I know virtually nothing about them.. I'm sorry but you are on your own.

> 
> The only problem I have seen is that unlike a Cisco switch, I have not 
> been able to move devices from various VLAN IDs when they connect via 
> Vyatta and its VPN.  The VPN provides the IP address and default 
> gateway.  This is why I wanted to move away from the VLAN isolation 
> method and try one of the other two.  Can PF work with VPNs?  What can 
> PF do when the IP address of the client is fixed by the VPN gateway?

Some VPNs can use RADIUS as AAA so I would look in that direction.

> 
> I installed the ARP patch, and spend several hours trying to get that to 
> work.  For some reason, PF was not poisoning the gateway MAC entry on 
> the "unregistered" client, allowing them complete network access.   I 
> used configurator.pl and build numerous configuration files ... all with 
> the same result of not being able to block access.  Even looking at 
> dozens of search results, many others seemed to have the same problem.

I would assume that if poisoning didn't work for unregistered but worked 
for a registered node with a violation then the patch was wrongly 
applied or was wrong in itself (it is old after all).

Otherwise, it could be
a) PF was not located in the correct L2 network (inside the VPN, not 
outside maybe?)
b) virtual switches have poisoning protection built-in
c) something else...

> 
> I am going to work with the Radius AAA approach you mention.  This is 
> actually where I wanted to end up ... I just didn't want to enable to 
> many components too early.  I am struggling with the FreeRADIUS 
> configuration, as most of the documentation seems to address using this 
> with wireless.  Since I am relatively new to PF, it is hard to 
> understand exactly what modules I will need to customize. 
> 

At this point, you are almost out of PacketFence land so don't worry 
about not knowing it enough. PF only adds RADIUS attributes after 
everything else was handled by FreeRADIUS.

You might need to return specific attributes to the Vyatta. Check what 
they support. The easiest/best integration would be that you can return 
a VLAN (and this VLAN would span into and through the VPN).

In a nutshell, here are general FreeRADIUS tips:

- go with the 802.1X config. don't mind wireless or wired, both 
transport EAP so they are transparent on the FreeRADIUS side of things

- run radiusd in debug (IMPORTANT!)
radiusd -X

- configure a simpler packetfence module only for tests (modify 
rlm_perl_packetfence.pl)
sub authorize {

        my $vlan = 10;

        $RAD_REPLY{'Tunnel-Medium-Type'} = 6;
        $RAD_REPLY{'Tunnel-Type'} = 13;
        $RAD_REPLY{'Tunnel-Private-Group-ID'} = $vlan;
        return RLM_MODULE_OK;
}
this will return VLAN 10. Put in your registration VLAN instead. You 
might need other attributes, check Vyatta doc.

- start reading the FreeRADIUS debug trace from last entry and read up 
until you see the mention of an error. Because of the modular nature of 
FreeRADIUS the last message is often not the problem, you need to dig up.

> I am worried that I have hit a wall, because my limitation is that the 
> "soft" switches will only support link change.  Where can I read about 
> the limitations of PF when using switches with such limited capabilities?

By 'Link change' you mean 'link change traps'? If so then by taking the 
FreeRADIUS approach, you completely avoid that problem. Under AAA, it's 
the server who asks PacketFence for access requests and when PacketFence 
needs to isolate or perform any state change, it will ask the VPN (if 
the VPN is the NAS) to perform re-negotiation of the client, which will 
trigger the appropriate change. No down/up traps required.

> 
> Appreciate your help.

No problem.

If you feel you are getting into too many unknown territory, consider 
sponsoring us for the development in that area. I would love to work on 
that (Vyatta and purely virtual environments) but unfortunately, I can't 
unless it can sustain our business.. If you are interested in knowing 
more about this possibility, let me know.

Have a nice day!
-- 
Olivier Bilodeau
[email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to